Debian Package Tracker
Register | Log in
Subscribe

intel-microcode

Processor microcode firmware for Intel CPUs

Choose email to subscribe with

general
  • source: intel-microcode (non-free-firmware)
  • version: 3.20260210.1
  • maintainer: Henrique de Moraes Holschuh (DMD)
  • uploaders: Giacomo Catenazzi [DMD]
  • arch: amd64 i386 x32
  • std-ver: 4.1.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.20240813.1~deb11u1
  • o-o-sec: 3.20250812.1~deb11u1
  • o-o-p-u: 3.20240813.1~deb11u1
  • oldstable: 3.20251111.1~deb12u1
  • old-sec: 3.20250812.1~deb12u1
  • stable: 3.20251111.1~deb13u1
  • stable-sec: 3.20250812.1~deb13u1
  • testing: 3.20251111.1
  • unstable: 3.20260210.1
versioned links
  • 3.20240813.1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20260210.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • intel-microcode (17 bugs: 0, 14, 3, 0)
action needed
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-16 10:52
4 open merge requests in Salsa normal
There are 4 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-21 Last update: 2025-09-21 10:02
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-09-14 Last update: 2025-09-14 13:33
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-31648: (needs triaging) Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-11 Last update: 2026-02-16 10:52
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-31648: (needs triaging) Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-11 Last update: 2026-02-16 10:52
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.1.1).
Created: 2018-01-05 Last update: 2026-02-16 10:56
testing migrations
  • excuses:
    • Migration status for intel-microcode (3.20251111.1 to 3.20260210.1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for check-dfsg-status: amd64: Test triggered, i386: Test triggered
    • ∙ ∙ Autopkgtest for intel-microcode: amd64: Test triggered, i386: Test triggered
    • ∙ ∙ Too young, only 4 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts can't test intel-microcode (not a blocker) - (no link yet)
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ Reproducible on arm64
    • ∙ ∙ Reproducible on armhf
    • ∙ ∙ Reproducible on i386
    • ∙ ∙ Reproducible on ppc64el
    • Not considered
news
[rss feed]
  • [2026-02-14] Accepted intel-microcode 3.20260210.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2026-01-01] Accepted intel-microcode 3.20251111.1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-12-21] Accepted intel-microcode 3.20251111.1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-11-16] intel-microcode 3.20251111.1 MIGRATED to testing (Debian testing watch)
  • [2025-11-13] Accepted intel-microcode 3.20251111.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-11-01] Accepted intel-microcode 3.20250812.1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-26] Accepted intel-microcode 3.20250812.1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-25] Accepted intel-microcode 3.20250812.1~deb11u1 (source) into oldoldstable-security (Tobias Frost)
  • [2025-10-22] Accepted intel-microcode 3.20250812.1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-22] Accepted intel-microcode 3.20250812.1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-09-19] intel-microcode 3.20250812.1 MIGRATED to testing (Debian testing watch)
  • [2025-09-13] Accepted intel-microcode 3.20250812.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-05-25] Accepted intel-microcode 3.20250512.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-05-23] Accepted intel-microcode 3.20250512.1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-05-22] intel-microcode 3.20250512.1 MIGRATED to testing (Debian testing watch)
  • [2025-05-18] Accepted intel-microcode 3.20250512.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2025-05-17] Accepted intel-microcode 3.20250512.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-03-29] Accepted intel-microcode 3.20250211.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2025-03-08] Accepted intel-microcode 3.20250211.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-02-22] intel-microcode 3.20250211.1 MIGRATED to testing (Debian testing watch)
  • [2025-02-16] Accepted intel-microcode 3.20250211.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-12-23] Accepted intel-microcode 3.20241112.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2024-12-18] Accepted intel-microcode 3.20241112.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2024-11-24] Accepted intel-microcode 3.20240910.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2024-11-20] intel-microcode 3.20241112.1 MIGRATED to testing (Debian testing watch)
  • [2024-11-14] Accepted intel-microcode 3.20241112.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-11-02] Accepted intel-microcode 3.20240910.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2024-09-27] intel-microcode 3.20240910.1 MIGRATED to testing (Debian testing watch)
  • [2024-09-21] Accepted intel-microcode 3.20240910.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-08-22] Accepted intel-microcode 3.20240813.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • 1
  • 2
bugs [bug history graph]
  • all: 18
  • RC: 0
  • I&N: 14
  • M&W: 4
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.20250812.1ubuntu1
  • 41 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing